32
Local Area Tracking and Monitoring System Design Report Temp Dec01-08 16 April, 2001 Faculty Advisors: John W. Lamont Ralph Patterson III Team Members: Brent Gill Eric Jackson Muhammad Umar Sheikh Shih-Hau Kuan Hui Liu

Design Report

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Design Report

Local Area Tracking and Monitoring System

Design ReportTemp Dec01-0816 April, 2001

Faculty Advisors:John W. Lamont

Ralph Patterson III

Team Members:Brent Gill

Eric JacksonMuhammad Umar Sheikh

Shih-Hau KuanHui Liu

Page 2: Design Report

Abstract

The project is to locate and track a moving object in a confined area e.g. a patient in a

nursing home or a forklift in a factory, or to track computers or other assets. Various

technologies were considered including a cell-based tracking system using radio

frequency identification (RFID), asset tracking system using detectors, micropower

impulse radar tracking system using electromagnetic pulses, infrared beacon tracking

system, and radio triangulation and telemetry tracking system. The results of this project

could have many applications in domestic and commercial products. It was found that

the most practical technology for the implementation of this application would be RFID.

Definition of Terms

Triangulation: Measuring distance using the travel time of radio signals propagating

within a combination of two or more receivers (satellites) and a transmitter

Telemetry: The transference of data over a wireless channel

RFID: Radio frequency identification

LOS: Line of sight

LED: Light emitting diode

LCD: Liquid crystal display

MIR: Micropower impulse radar

Transponder: A device that responds to a signal received from an external source

Reader: A device that is able to interpret signals received from a source

AIDC: Automatic identification and data capture

Page 3: Design Report

PROJECT DESIGN

Introduction

General Background

The project involves developing a local area tracking and monitoring system. The system

is to be designed to track residents of a nursing home or other care facility, in order to

ensure that they stay on the premises. This application would require tracking to

determine perimeter violation, along with the location of that perimeter violation. A

central computer would be used to display location information. This computer system

should be simple enough to be monitored by the normal staff of the institution. Two

other applications were also considered and they are listed below.

To track forklifts and/or other mobile machinery in a large industrial complex, such

as a warehouse. This application would require on-demand tracking of the exact

location of the entity. A central computer would be used to display location

information.

To deter computer or equipment theft. A perimeter violation system would be

implemented to trigger alarms should any protected piece of equipment break the

perimeter. Periodic location resolution is sufficient for this application.

Technical Problem

In order to implement this system, radio frequency identification will be used. This

technology would require radio frequency transponders on each tracked object, radio

frequency reading units to be placed strategically throughout the tracking area, and a

Page 4: Design Report

central computer to manage all the collected data. The central computer would be used

to display location information, and could be either a PC or a microcontroller and LCD

display. The software would be written in C or Assembly. Below is a graphic depicting

common RFID technologies.

Figure 1 - RFID Technologies

http://home.att.net/~randall.j.jackson/rfid.htm

Several other technologies were also considered, but were eliminated due to cost and/or

complexity. These technologies are detailed below.

Radio triangulation and telemetry . This technology would require two or more

receiving antennas, a transmitter located on the tracked object, extremely accurate

time synchronization equipment, and a central computer (PC). The central computer

would be used to display location information, as needed. The software for this

system would be programmed in C++ or Visual Basic. This technology was rejected

due to cost and accuracy issues.

Micropower impulse radar . This technology would require the radar device and a

central computer (PC). The central computer would be required to do several tasks

Page 5: Design Report

such as filtering, imaging, and identifying tracked objects. Thus, the central computer

would need to be quite fast. The software for this system would be programmed in

Matlab and C++/Visual Basic. This system was rejected due to the fact that it can not

distinguish between multiple targets. Also, very costly, sophisticated equipment

would need to be used.

Infrared beacon . This technology would require an infrared source (such as an LED),

to be carried by each tracked object, two rotating infrared receivers, and a central

computer (PC). The central computer would used for location resolution and display.

The software for this system would be programmed in Visual Basic. This

technology was rejected due to its inefficiency in an unclean environment. Also, it

required line of sight operation, which is not always practical in with this application.

Frequency detection unit . This technology would require a transmitter on each

tracked object, and strategically placed receivers. This system would not be able to

discriminate between objects. The output would simply be whether or not a signal is

detected. This technology was rejected due to its inability to discriminate between

different objects.

Operating Environment

The operating environment for the human tracking system would be both indoors and

outdoors. The system should not be affected by electronic equipment commonly found in

offices. Temperature range of operation is expected to be approximately between 0-120

degrees Fahrenheit. Operating environments for the discarded applications are included

below.

Page 6: Design Report

For the forklift application, the technology would be operating in an industrial setting.

The system should then be able to function in a fairly dirty environment, as dust and

other contaminants may be present. The system should also be resistant to any

electrical interference caused by operating machinery, within reason. Some

resistance to both high and low temperatures would be needed, with an operating

range approximately between 0-110 degrees Fahrenheit.

For the computer security application, the technology would operate in an office or

lab setting. The system should be adequately shielded from electronic emissions

from such sources as computer components and power supplies. Temperature range

of operation is expected to be approximately between 60-80 degrees Fahrenheit.

Intended User/Uses

The intended user of the human tracking system would be the staff of a nursing home or

medical care facility. The system would be used to detect entry to or exit from certain

areas to protect patients or residents. An example would be to detect the exit of an

Alzheimer’s patient from the facility, in order to protect them from wandering away. For

completeness, the intended user and uses of the two discarded applications is included

below.

The forklift application is intended for use by plant employees. It is to be used to

track the locations of mobile equipment uniquely, so that a particular piece of

equipment can be found on demand.

Page 7: Design Report

The computer security system is intended to be used by IT or equipment staff. The

system would be used for security purposes to detect the removal of computers or

other valuable equipment from the facility.

Assumptions

Assumptions are listed below, also included are assumptions from discarded applications.

Human Tracking Application

The tracked person shall not remove a transmitter or transponder, or subject

them to adverse conditions.

Transponders will be small enough to “hide” on patient or resident.

Wideband noise will not be sufficiently powerful to disrupt communication

between the reader and transponders.

Forklift Application

Technology will not operate in a hazardous environment (IR sensitivity to

dust and contaminants).

Computer Security Application

Tracked materials shall only be removed from the building via doors or

windows (perimeter monitoring only).

Limitations

Limitations are listed below, by technology. Also included are eliminated technologies.

Radio Frequency Identification

Continuous tracking is impossible due to cost considerations.

Page 8: Design Report

Transponders must not be blocked or enclosed in radio frequency dampening

materials.

Only entities with transponders can be tracked.

If an active system is used, transponders may require periodic maintenance.

Radio Triangulation

All transmitted signals must be low power to reduce interference.

Micropower Impulse Radar

Unique identification of two or more of the same type of entity, such as two

identical forklifts, is not possible with this technology.

Multiple radar sites can only be implemented if the central computer is of

sufficient speed to handle the extra load, due to cost considerations.

Infrared Beacon

Line of sight is necessary for this technology to determine position.

Continuous tracking of entities is not possible.

Beacons and receivers must be kept clean.

Frequency Detection Unit

Unique identification of tracked objects is not possible.

Transmitters must not be blocked or enclosed in radio frequency dampening

materials.

Page 9: Design Report

Design Requirements

Figure 2 - RFID System Graphic

http://www.axsi.comIn designing this system, the team has considered three main applications and several

technologies to use in implementing the system. Among the applications were asset

monitoring, machinery tracking, and human tracking. It was finally chosen to proceed

with human tracking. However, the other two applications will be discussed as well.

Human Tracking

Design Objectives

The project will use an RFID system to track and monitor people. This system must

include:

A passive transponder card with a unique identification code to be carried by all

persons to allow identification.

An antenna to transmit pulses of power to the transponder and to receive a signal

back from it.

Page 10: Design Report

A reading unit that reads the signal from the antenna, processes its identification

code and sends it out a serial link to a central computer.

A central computer to receive data by networking all of the readers together.

A software application to process and keep track of all movement within the

covered range.

Functional Requirements

The components of this project must be combined to perform several necessary tasks.

These tasks are listed below.

The transponder cards must each have a unique identification code and must stay

with the person that they were issued to.

This antenna must have sufficient range (>1.5 meters) to allow easy and

guaranteed detection from a normal operating range at all locations where a

reading unit is being used.

The antenna must be able to read more than one signal simultaneously.

The antenna must be able to interface with the reading unit.

The reading unit must be able to distinguish between each identification code.

The reading unit must be able to read and distinguish between more than one

identification code simultaneously.

The reading unit must be able to communicate with a central computer.

The central computer must be able to take input from each reading unit and

update the positions of people based on the input.

The software application must be able to display current information in an easy to

use manner.

Page 11: Design Report

Machinery Tracking

The second application would be to track objects such as forklifts in a warehouse setting.

This system must be able to uniquely distinguish between each vehicle to be tracked.

This system would involve several requirements.

Design Objectives

The design must include

An active beacon device attached to each vehicle wishing to be tracked.

Multiple detectors located strategically throughout the warehouse depending on

warehouse dimensions to allow for triangulation throughout the warehouse or

manufacturing facility.

A central computer that receives signals from all the detectors to compute and

display the location of all vehicles.

Functional Requirements

The beacon would need to be powered and would need to have a sufficient range

for the signals to propagate to the detectors, through walls if need be.

The beacon would need to send out an unique identification code at short intervals

that would be detectable by multiple detectors.

The detectors would need to be able to process multiple signals at once coming

from all vehicles.

The detectors would need to be networked in some way to allow for the

triangulation calculations.

The detectors would need a very short latency to allow for fast calculations.

Page 12: Design Report

The detectors would need a very accurate timing mechanism to heighten the

precision of the system.

The computer would need to be know the location of all the detectors.

The computer would need to be able to quickly process all incoming data.

The computer would need to display location information in a meaningful way.

Asset monitoring

The third application considered is asset monitoring and protection. An example of such

an application would be to track computers and peripherals making sure that they did not

violate an arbitrary perimeter, thus ensuring they would not be stolen. This system would

not need to distinguish between different components. To implement this system, many

objectives must be met.

Design Objectives

The design must include

A frequency detection unit that could detect radio signals from tags

attached to assets.

A tag attached to each asset that sends out radiation to be picked up by the

detector.

Functional Requirements

The detectors would have to be placed at all possible exits from the room to

ensure maximum security. Leaving out such things as windows would greatly

undermine the value of the system.

Page 13: Design Report

The detectors would need to set off an alarm when the perimeter is breached by

an asset.

The detectors would work by reading a tag attached to each item being tracked.

The detectors would need a source of power and would need to be relatively small

so as to fit in areas such as doorways and windows.

The tags would be very small and passive in nature. They would be very small

and inconspicuous and could easily fit inside computers without affecting the

operation of the tags or the computers.

The tags would all be identical thus making it impossible to distinguish between

each item.

Design Constraints

Cost

The end product should be made inexpensive and affordable for all applications without

compromising on the performance and reliability. However, the unavailability of a

sponsor has posed a financial constraint for the team.

Size

The size of the transponders should be kept as small as possible for convenient

installation and handling. The desired dimensions of a transponder are 5” * 2” * 0.75”,

which are scalable for small, medium, and large enterprises.

Power consumption

Keeping in mind the requirement of continuous tracking of the patients in a nursing

home, the team wants to keep the power consumption of the end product as low as

possible. Passive transponders do not require any power. Therefore, the transceiver’s

Page 14: Design Report

power requirement is the only concern. In such an environment, power would be readily

available to the transceiver.

Capture Area

Larger coverage area means lesser number of transponders per unit area. The transceiver

should be able to detect the reader within 120 of symmetric sweep. The size and power

consumption of the unit has to be compromised for enhanced coverage area.

Target Visibility

RF tags do not need to be seen to be read. However, a thick metal or similar radio

frequency obstructing material can affect the performance of the system.

Temperature

Temperature range of the system is expected to be 0-120 F. Extreme temperatures are

expected to affect the performance of the system.

Interference

The system should be adequately shielded from the electronic emission and fields of

other computers and power supplies.

Measurable Milestones

Final Design

Final design should contain all functions and fulfill design criteria.

Prototype Implementation

A prototype should be successfully constructed.

Successful Testing

All proposed tests should be satisfied.

Page 15: Design Report

Demonstration of a working prototype

A scalable working prototype should be demonstrated that will determine the success of

the project.

End Product Description

The end product will be a human monitoring system for use in managed care facilities. It

will consist of a central computer to monitor the movements of tagged individuals past

checkpoints set with RFID readers. An example of its use would be to track patients in a

nursing home to ensure that they stay on the premises, thus reducing the risk of injury.

Approaches and Design

Technical approaches

Five types of technologies were considered, as listed below.

Radio frequency identification (RFID)

Radio frequency identification (RFID) is a relative new automatic identification and data

capture (AIDC) system. The wireless AIDC system allows for non-contact reading and

consequently is effective in some environments where barcode labels could not survive.

System will use transponders with a range of at least 1 meter.

System will use transceivers that can incorporate multiple inputs.

System will use bar antennas for desired coverage area.

Asset tracking system using detectors

Asset tracking system could be used for simple and advantage applications.

System will use passive modules, simple detectors, and alarm system.

Page 16: Design Report

System will use transceivers that can incorporate multiple inputs.

Passive modules are attached on each asset (such as television, computer, etc).

Detectors are located on each door or window.

Micropower impulse radar tracking system

Micropower impulse radar (MIR) tracking system uses very short electromagnetic pulses,

so it can detect objects at much shorter range.

System will use MIR concealable sensors and alarm system.

The effective range of MIR concealable sensor is 6 meters.

The system detects motion by repeatedly monitoring the echo pattern to see if it

changes.

Infrared Beacon tracking system

Infrared beacon tracking system uses infrared technology to track move object.

System has inside-in, inside-out, and outside-in three kinds.

System uses sensor(s), source(s), and computer control system.

The sensors are attached on object, sources attached to the reference.

Radio triangular and telemetry tracking system

Radio triangular and telemetry tracking system is to measure the distance and angle of a

wanted source with given at least two measurements. It has radio generator, signal

receiver and transmitter, computer control system, and alarm system.

System will use radio generator generate signals.

System will receive and transmit the object reflects signal.

Computer control system deal the data and gets the accurate position of the object.

Page 17: Design Report

Technical design

After comparing five technologies, finally, the project will use radio frequency

identification (RFID). RFID was chosen because it has a low cost (<$600 US) and it

fulfills the requirements of the monitoring system, despite its less complex nature. The

advantages and disadvantages of the five different technologies are discussed below.

Radio frequency identification (RFID)

Radio frequency identification (RFID) system would require some main parts:

transponder, antenna, transceiver, and computer.

Advantages:

Easy installation and using

Lower cost transponders offering multi-read capabilities

Wide range of data transfer rates

High (64Kbits) data storage capabilities

Without the need for line-of-sight interrogation

Allowing use in reasonable harsh conditions

Security

Disadvantages:

System will operate in enclosed area only

Each tracked entity will carry a transponder

Entry and exit will be monitored at predefined locations only

Page 18: Design Report

Asset tracking system using detectors

Asset tracking system would have passive modules, simple detectors, and alarm system.

Advantages:

Easy installation

It can be easily implemented

Have many more uses

Reasons for Discarding (Disadvantages):

Expensive to implement

Impossible to distinguish between unique targets, thus not useable for the human

tracking application

Micropower impulse radar tracking system

Micropower impulse radar (MIR) tracking system has two parts: MIR concealable

sensors and alarm system.

Advantages:

Easy installation

It can be easily used

Security

Reasons for Discarding (Disadvantages):

The penetration of MIR signals through a material decreases as that material’s

electrical conductivity increases.

Extensive signal processing is required to uniquely identify targets. This is

beyond the scope of the project.

Page 19: Design Report

Infrared Beacon tracking system

Infrared beacon tracking system has inside-in, inside-out, and outside-in three kinds

system. It has sensor(s), source(s), and computer control system.

Advantages:

Easy installation

Convenient use

Security

Reasons for Discarding (Disadvantages):

Difficult or impossible to uniquely distinguish different targets, a requirement for

the application.

Prepare the map of area will being monitored.

Radio triangular and telemetry tracking system

The radio triangular and telemetry tracking system has radio generator, signal receiver

and transmitter, computer control system, and alarm system.

Advantages:

Reliable and effective

Security

Reasons for Discarding (Disadvantages):

Very expensive (many thousands of dollars).

Very technologically intensive, requiring advanced synchronization equipment.

Testing Description

Page 20: Design Report

The testing procedure will consist of software and hardware testing. The software test

will include module and performance testing.

Each component of the hardware must be tested individually as well as in connection

with the other components.

Risks and risk management

Technical Failure

The team may encounter technical or design failures due to unforeseen events.

Shortage of Financial assets

The team is expecting a financial constraint due to the unavailability of a sponsor.

Increasing efforts are being made to locate a suitable sponsor.

Unable to counter problems

The team may encounter certain unavoidable circumstances that may hinder the progress

of the project.

Time shortage

Running out of time can have drastic effects on the project.

Conflict between team members

In the process of doing the project, there may be conflicts between team members. This

may result in unaccomplished milestones. Therefore, the team must work in a

cooperative manner.

Recommendation for continued work

In the event that a suitable sponsor is found, the project shall be completed as designed.

If no sponsor can be found, the project will be restricted to a theoretical design.

Financial Budget

Page 21: Design Report

Table 1 - Financial Budget

Item Original Estimated Cost Revised Estimated CostLabor $0 $0Equipment/Parts $1500 $50Telephone/Postage $0 $15Printing $150 $37Total Estimated Cost $1650 $102

No labor costs were estimated as the team will complete the required tasks.

Personnel Effort Budget

The estimated personal effort budged for the project is outlined below.

Table 2 - Personnel Effort budget

Personnel Original Estimated Effort(hrs)Revised Estimated Effort(hrs)

Brent Gill 107 104Eric Jackson 99 101Muhammad Umar Sheikh 102 103Shih-Hau Kuan 106 107Hui Liu 97 99Total 511 514

The team members have tried to utilize their time efficiently in order to meet the project

requirements.